Upload
christine-astovasadourian
View
95
Download
0
Embed Size (px)
Citation preview
Top 12 Predictions fromLeading Cybersecurity Experts
ibm.co/threatintelligence
What will 2016 hold for cybersecurity?Expect continued developments as both the public and private sectors implement
intelligence-led approaches to threats.
ibm.co/threatintelligence
12“New data sources arising from the
Internet of Things and biometrics will lead to a renewed government interest in using big data to prevent terrorism.” Andrew Borene, federal manager, i2 Safer Planet
ibm.co/threatintelligence
11“Private organizations will increase
their visibility into the dark web to become more proactive about cyberthreats than ever before.”Bob Stasio, senior product manager for
cyber threat analysis, i2 Safer Planet
ibm.co/threatintelligence
10“The international community will create safe zones in Syria to stem the mass migration to
Europe, and big data analytics will play an integral role in enforcing identity resolution and border security in those safe zones.”
Todd Rosenblum, senior executive forworldwide big data, i2 Safer Planet
ibm.co/threatintelligence
“Companies and government agencies will begin using block-chain encryption
to protect against cyberthreats.”
Bob Stasio9
ibm.co/threatintelligence
“Auditability and managed access of US citizens’ personal data will be an increasingly important requirementfor US national security agencies.”
Todd Rosenblum8
ibm.co/threatintelligence
7“Companies will begin properly
inventorying digital assets and data aspart of their risk management strategies,
heightening understanding of threat surfaces and ways of minimizing them.” Shahid Shah, CEO, Netspectives Communication
ibm.co/threatintelligence
“‘Big X’ consulting firms will offer their customers cyberintelligence-as-
a-service consulting options.”Bob Stasio6
ibm.co/threatintelligence
“Vulnerability curators will become increasingly prevalent as companies
learn to share breach data.”Shahid Shah5
ibm.co/threatintelligence
“Continued cybersecurity breaches and state-sponsored cyber espionage will lead
to spikes in cybersecurity spending on both workforce and software solutions.”
Andrew Borene4
ibm.co/threatintelligence
“Large financial organizations will continue divesting themselves
of managed security services to create their own fusion centers.”
Bob Stasio3
ibm.co/threatintelligence
“Third-party libraries and software components will increasingly gain
attention as CIOs and CISOs realize how many vulnerabilities they create.”
Shahid Shah2
ibm.co/threatintelligence
1“The market for behavioral
analytics and threat detection offerings will continue unabated.”
Bob Stasio
Prepare yourself for future trendsin cybersecurity and threat analysis.
ibm.co/threatintelligence